Patents Assigned to In-Defense, Inc.
-
Patent number: 12242963Abstract: A detection device is adapted to traverse a search area and generate sensor data associated with an object that may be present in the search area, the detection device comprising a first logic device configured to detect and classify the object in the sensor data, communicate object detection information to a control system when the detection device is within a range of communications of the control system, and generate and store object analysis information for a user of the control system when the detection device is not in communication with the control system. A control system facilitates user monitoring and/or control of the detection device during operation and to access the stored object analysis information. The object analysis information is provided in an interactive display to facilitate user detection and classification of the detected object by the user to update the detection information, trained object classifier, and training dataset.Type: GrantFiled: September 30, 2022Date of Patent: March 4, 2025Assignee: Teledyne FLIR Defense, Inc.Inventors: A. Peter Keefe, James Leonard Nute
-
Patent number: 12222495Abstract: A system comprises a sensor subsystem for imaging an object space, and a telescope for coupling electromagnetic energy from the object space to the sensor subsystem. The system comprises a bypass optical path that bypasses the telescope on the way to the sensor subsystem in order to provide a larger field of view of the object space. The bypass path and the telescope path merge at a merging point between the telescope and the sensor subsystem, and are disjoint upstream of the merging point. A simple bypass configuration is therefore provided, with possibly just a single fold mirror at the merging point. A sensor may form an intermediate image, and a frame is placed at the intermediate image to reject stray radiation and provide a real and accessible intermediate pupil for the sensor. Other features are also provided.Type: GrantFiled: May 20, 2022Date of Patent: February 11, 2025Assignee: TELEDYNE FLIR DEFENSE, INC.Inventor: Bruce Cannon
-
Patent number: 12201949Abstract: Autonomous localized permeability material systems are provided that can include: a dynamically permeable porous material; and immobilized reagents operatively associated with the porous material in sufficient proximity to trigger a localized change in material pore size upon reagent reaction. Methods for preparing these materials are also provided as well as methods for autonomously modifying localized permeability of material.Type: GrantFiled: January 31, 2018Date of Patent: January 21, 2025Assignee: TELEDYNE FLIR DEFENSE, INC.Inventors: Jennifer L. Poole, Jeremy P. Walker, Scott Donahue
-
Patent number: 12126942Abstract: Camouflage detection systems and related techniques are provided to improve the detection of camouflaged targets, including targets employing active thermal camouflage techniques. A camouflage detection system includes an imaging system and a logic device configured to communicate with the imaging system and a supplemental sensor system. The imaging system includes an infrared imaging module configured to provide infrared and/or thermal image data of a scene including a camouflaged target. The logic device is configured to receive infrared image data and supplemental sensor data, determine an estimated target spatial profile, and determine one or more target profile anomalies based, at least in part, on the estimated target spatial profile.Type: GrantFiled: October 5, 2020Date of Patent: October 22, 2024Assignee: Teledyne FLIR Defense, Inc.Inventor: Jason Krantz
-
Publication number: 20240240898Abstract: A suppressor having a front cap assembly comprising outer cap and inner cap elements that are matable and rotationally engaged, with a first condition having a first gas flow characteristic between the chamber and the exterior and a second condition having a first gas flow characteristic between the chamber and the exterior. The outer cap element defines a first gas bypass aperture, and the inner cap element defines a second gas bypass aperture, angularly offset from each other by a rotational offset increment. The gas bypass apertures may be registered or not registered depending on the condition. The outer cap defines an eccentric aperture, and the inner cap defines a protrusion, which may be polygonal and has a plurality of opposed parallel faces to include tool-engagement surfaces, defining a bullet bore, and configured to be closely received in the eccentric aperture for rotational engagement.Type: ApplicationFiled: January 15, 2024Publication date: July 18, 2024Applicant: C PRODUCTS DEFENSE, INC.Inventor: Christopher Sirois
-
Publication number: 20240236146Abstract: Methods, systems, and apparatuses for detecting a presence of a malicious application are disclosed. In an example, a method includes determining a prediction for human user interaction with webpage content of a website by identifying webpage elements in the webpage content, where the webpage elements are for human user interaction, and determining at least one of spatial density of cursor movements or cursor velocity vectors relative to the webpage elements that are indicative of human user interaction with the webpage content. The method further includes using the prediction for human user interaction with the webpage content to determine if received webpage interaction information from a client device is indicative of a presence of a malicious application. The method provides an indication of the presence of the malicious application when the received interaction information is indicative of the presence of a malicious application.Type: ApplicationFiled: March 22, 2024Publication date: July 11, 2024Applicant: SunStone Information Defense, Inc.Inventor: David K. Ford
-
Publication number: 20240202292Abstract: A system, apparatuses, and methods for mobile device security are disclosed. In an example, a system includes a mobile endpoint device wirelessly communicatively coupled to a user device via a short range air gap. The system also includes a proxy server communicatively coupled to the user device via a network connection. The mobile endpoint device is configured to receive a text input from a user, convert the text input into a first format for transmission over the short range air gap, encrypt the converted text input, and transmit the encrypted converted text input to the user device. The proxy server is configured to receive the encrypted converted text input from the user device, decrypt the encrypted converted text input; convert the decrypted converted text input into a second format compatible with an application server, and transmit the converted text input in the second format to the application server.Type: ApplicationFiled: January 8, 2024Publication date: June 20, 2024Applicant: SunStone Information Defense, Inc.Inventor: David K. Ford
-
Patent number: 11977395Abstract: Systems and methods for powering and controlling flight of an unmanned aerial vehicle are provided. The unmanned aerial vehicles can be used in a networked communication system. A tether management system can be used to facilitate both mobile and static tethered operation to provide power and/or voice and data communication.Type: GrantFiled: March 27, 2020Date of Patent: May 7, 2024Assignee: Teledyne FLIR Defense, Inc.Inventors: Bretton E. Anderson, Philip N. Lafountain, Alexey Zaparovanny, Misha Filippov, Samir S. Mistry, Chikyung Won, Kevin Michael McClure, Caroline Ekchian
-
Publication number: 20240134981Abstract: Methods and apparatus for interfering with malware using displaced display elements are disclosed. In an example, a processor is configured to change a location of a displayed pointer by a first offset vector from a hidden true pointer. The processor is also configured to change a location of at least one application display element, such as a website “Submit” button, by a second offset vector from a hidden true application element. The first offset vector may have a similar magnitude as the second offset vector but an opposite direction Changing a location of a pointer and the application element by the offsets enables a user to interact with the application normally. However, the offsets prevent malware or a malicious application from inter-acting with the application.Type: ApplicationFiled: December 21, 2023Publication date: April 25, 2024Applicant: SunStone Information Defense, Inc.Inventor: David K. Ford
-
Patent number: 11943255Abstract: Methods, systems, and apparatuses for detecting a presence of a malicious application are disclosed. In an example, a method includes determining a prediction for human user interaction with webpage content of a website by identifying webpage elements in the webpage content, where the webpage elements are for human user interaction, and determining at least one of spatial density of cursor movements or cursor velocity vectors relative to the webpage elements that are indicative of human user interaction with the webpage content. The method further includes using the prediction for human user interaction with the webpage content to determine if received webpage interaction information from a client device is indicative of a presence of a malicious application. The method provides an indication of the presence of the malicious application if the received interaction information is indicative of the presence of a malicious application.Type: GrantFiled: March 21, 2022Date of Patent: March 26, 2024Assignee: SUNSTONE INFORMATION DEFENSE, INC.Inventor: David K. Ford
-
Patent number: 11926251Abstract: This specification describes systems for unmanned vehicle carrying and deployment. In some examples, a system includes a deployable robot including at least one rotatable flipper disposed on a surface of the deployable robot. The system includes a base unmanned vehicle configured for carrying and deploying the deployable robot. The base unmanned vehicle includes a base robot chassis, and the base robot chassis includes a platform for securing the deployable robot and at least one retention bracket disposed on the platform. The flipper is configured to rotate in a first rotational direction to lock the deployable robot onto the base robot chassis by engaging with the retention bracket.Type: GrantFiled: July 31, 2020Date of Patent: March 12, 2024Assignee: Teledyne FLIR Defense, Inc.Inventors: Elliott Forrest Leslie, Annan Michael Mozeika, Daniel Tully, Jordan Daniel Jesiolowski
-
Patent number: 11868450Abstract: A system, apparatuses, and methods for device and network security are discussed herein. In an example, a security device for providing security to user-entered inputs includes a universal serial bus (“USB”) port configured to receive a connector of an input device and a USB connector configured to connect to a port of a user device. The apparatus also includes a processor configured to receive a string of characters from the input device that correspond to inputs made by a user into a web browser or application on the user device. The processor adds at least one security character to the string of characters to generate a watermark string, and transmits the watermark string to the user device. The processor is configured to format the at least one security character such that only the string of characters are displayed in the web browser or the application at the user device.Type: GrantFiled: July 1, 2022Date of Patent: January 9, 2024Assignee: SUNSTONE INFORMATION DEFENSE, INC.Inventor: David K. Ford
-
Patent number: 11853423Abstract: Methods and apparatus for interfering with malware using displaced display elements are disclosed. In an example, a processor is configured to change a location of a displayed pointer by a first offset vector from a hidden true pointer. The processor is also configured to change a location of at least one application display element, such as a website “Submit” button, by a second offset vector from a hidden true application element. The first offset vector may have a similar magnitude as the second offset vector but an opposite direction Changing a location of a pointer and the application element by the offsets enables a user to interact with the application normally. However, the offsets prevent malware or a malicious application from interacting with the application.Type: GrantFiled: January 22, 2019Date of Patent: December 26, 2023Assignee: SUNSTONE INFORMATION DEFENSE, INC.Inventor: David K. Ford
-
Patent number: 11743291Abstract: Systems and methods mark or identify network data as being of interest by modifying the network data with a tag. A tag may be an unordered set of tag elements, and each tag element may be an ordered sequence of bits. For each data segment or packet transmitted, one or more fields of a network packet may be masked with a randomly chosen tag element.Type: GrantFiled: April 26, 2021Date of Patent: August 29, 2023Assignee: RIDGEBACK NETWORK DEFENSE, INC.Inventor: Thomas Sheppard Phillips
-
Patent number: 11716166Abstract: A handheld countermeasure device is disclosed herein. The device can include a hand-held form factor body. The device can include disruption components, a directional antenna, and a processor. The disruption components can be configured to generate a disruptive signal. The directional antenna can be configured to emit the disruptive signal. The processor can be configured to determine a position of the handheld countermeasure device based on a global navigation satellite system (GNSS) signal. The processor can be configured to load a device profile for the handheld countermeasure device based on the position of the handheld countermeasure device.Type: GrantFiled: July 28, 2021Date of Patent: August 1, 2023Assignee: Dedrone Defense, Inc.Inventors: Alexander Morrow, Daniel E. Stamm, Raphael J. Welsh, Daniel G. Loesch, Zachary Schmid
-
Patent number: 11695787Abstract: Disclosed are apparatus and methods that facilitate analysis of events associated with network and computer systems. The methodology includes determining at least one lookup key in a host device for an event occurring in the host device and determining whether the at least one lookup key is used in a memory to determine if at least one key-value pair exists for the event. The methodology also includes appending the at least one key-value pair to the event, and storing the at least one key-value pair in the memory based on the at least one lookup key including replacing existing keys found for the at least one lookup key.Type: GrantFiled: July 1, 2020Date of Patent: July 4, 2023Assignee: Hawk Network Defense, Inc.Inventors: Timothy J. Shelton, David Edwin Harris, Todd Jason Wheeler, Jr.
-
Patent number: 11687653Abstract: A system, method, and apparatus for identifying and removing malicious applications are disclosed. An example apparatus includes an executable application configured to collect data regarding processes operating on a client device during a time period. The executable application is also configured to purposefully access, during the time period, an application server using a web browser on the client device in an attempt to trigger a malicious application potentially located on the client device. The executable application is configured to transmit, after the time period, the collected data to an analysis server to determine whether the malicious application is located on the client device.Type: GrantFiled: March 18, 2019Date of Patent: June 27, 2023Assignee: SUNSTONE INFORMATION DEFENSE, INC.Inventor: David K. Ford
-
Patent number: 11573060Abstract: Magazine extensions have an extension body having a floor panel, a right side wall, and an opposed left side wall, and a front wall, the right and left side walls each including linear engagement facilities each configured to engage the floor plate attachment facility, the extension body defining a chamber between the right and left side walls and rear of the front wall, and open in an upward direction, the linear engagement facilities being operable to constrain movement of the extension body between an attached condition in which the chamber is registered with the internal passage, and a detached condition, a door slidably and removably connected to the extension body and having an upper door edge, the door movable between an attached condition in which the door spans between front or rear portions of the right and left side walls, and a detached condition.Type: GrantFiled: January 18, 2021Date of Patent: February 7, 2023Assignee: C PRODUCTS DEFENSE, INC.Inventor: Bernie Shreve
-
Publication number: 20220405355Abstract: A system, apparatuses, and methods for device and network security are discussed herein. In an example, a security device for providing security to user-entered inputs includes a universal serial bus (“USB”) port configured to receive a connector of an input device and a USB connector configured to connect to a port of a user device. The apparatus also includes a processor configured to receive a string of characters from the input device that correspond to inputs made by a user into a web browser or application on the user device. The processor adds at least one security character to the string of characters to generate a watermark string, and transmits the watermark string to the user device. The processor is configured to format the at least one security character such that only the string of characters are displayed in the web browser or the application at the user device.Type: ApplicationFiled: July 1, 2022Publication date: December 22, 2022Applicant: SunStone Information Defense, Inc.Inventor: David K. Ford
-
Patent number: D1069618Type: GrantFiled: July 31, 2020Date of Patent: April 8, 2025Assignee: Teledyne FLIR Defense, Inc.Inventor: Jeffrey Hammer Burns